App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

iPhone Endpoint Protection Applications

AvatarImg
Get free expert advice+1 (888) 216-6745
Call now for a one-to-one consultation in under 15 mins.

53 software options

Sponsored

1 filter applied



Integrated with


Pricing model




User rating


Personalize your search

Any industry

Any business size

ManageEngine Endpoint Central logo
4.5
(759)

Desktop, mobile device & patch management software

visit website
An integrated desktop & mobile device management application that enables the centralized management of desktops, servers, laptops, tablets & smartphones

Read more about ManageEngine Endpoint Central

Users also considered
NinjaOne logo
4.8
(203)

The Easiest-to-Use Unified IT Operations Solution

visit website
Ninja Protect provides unprecedented visibility and control over endpoints, robust patching, endpoint hardening, backup, and data protection capabilities alongside Bitdefender’s industry-leading next-generation AV and EDR capabilities, Ninja Protect is a solution ranked #1 on G2 for endpoint mgmt.

Read more about NinjaOne

Users also considered
ESET Endpoint Security logo
4.7
(1.1K)

Network security, network monitoring & endpoint protection

visit website
ESET Endpoint Security is a network monitoring solution, which helps businesses manage processes for detecting threats, blocking targeted attacks, preventing data breaches & providing protection against ransomware. It lets users monitor behavior of malicious processes and decloak memory segments.

Read more about ESET Endpoint Security

Users also considered
Kandji logo
4.9
(75)

Apple device management (MDM) for macOS, iOS, iPadOS, tvOS.

visit website
Kandji is the modern Apple MDM solution for IT teams that manage macOS, iOS, iPadOS, and tvOS devices at medium-to-large businesses. Features include zero-touch deployment, app management, automated patching, one-click security and compliance templates, and 150+ pre-built device controls.

Read more about Kandji

Users also considered
NordLayer logo
4.7
(29)

A stress-free way to secure your network.

visit website
NordLayer uses overall endpoint protection available on every major operating system by limiting potential risks of human error-sensitive phishing, malicious activity, and outdated patch cases with ThreatBlock, jailbroken/rooted devices detection, and increasing server reliability with custom DNS.

Read more about NordLayer

Users also considered
UTunnel VPN logo
5.0
(68)

Cloud VPN, Zero Trust Network Access, and Mesh Networking

visit website
UTunnel offers easy-to-deploy Cloud VPN, Zero Trust Access, and Mesh Networking solutions. Safeguard your business with secure remote access and encrypted site-to-site connectivity between distributed business networks. Deployment in minutes, Robust Support, and Affordable Pricing Plans!

Read more about UTunnel VPN

Users also considered
Malwarebytes for Business logo
4.7
(2.4K)

Complete cybersecurity software for businesses

learn more
Malwarebytes is a network security software that enables businesses to identify and detect potential cyberthreats across networks or enterprise servers. The cloud-based Malwarebytes Nebula platform lets administrators gain visibility into threat patterns from the centralized dashboard.

Read more about Malwarebytes for Business

Users also considered
1Password logo
4.7
(2K)

Password manager for businesses and families

learn more
1Password protects all company secrets such as passwords, security tokens, 2FA codes, documents, and passkeys to centralize and simplify the sign-in experience. Developers have access to features that help secure secrets and speed up workflows throughout the software development life cycle.

Read more about 1Password

Users also considered
Cisco AnyConnect logo
4.6
(948)

Virtual private network (VPN) to secure remote access

learn more
Cisco AnyConnect is a virtual private network (VPN) software designed to provide remote workforce with secure enterprise-wide network access across multiple locations and devices. Administrators can utilize the platform to identify network usage details.

Read more about Cisco AnyConnect

Users also considered
Trellix Endpoint Security logo
4.2
(1.8K)

Computer security and endpoint protection platform

learn more
Trellix Endpoint Security provides protection for endpoints, including laptops, PCs, and mobile devices. Its main functionalities include anti-virus, anti-spyware, automatic updates, firewall settings, and registry protection.

Read more about Trellix Endpoint Security

Users also considered
LogMeIn Central logo
4.5
(320)

Endpoint management for desktops, servers & mobile laptops

learn more
GoTo Central is an endpoint management solution which helps IT professionals to monitor, manage, and secure their organization's endpoint infrastructure including desktops, servers and laptops. Users can remotely deploy & automate routine IT tasks for any PC or Mac from anywhere, via any device.

Read more about LogMeIn Central

Users also considered
Splunk Enterprise logo
4.6
(221)

Machine data management and analytics

learn more
Splunk Enterprise is a cloud-based platform designed to assist businesses with big data management and analysis of machine data. Key features include data visualization, performance metrics, data collection, real-time search, indexing, KPI tracking, reporting, and monitoring.

Read more about Splunk Enterprise

Users also considered
FortiClient logo
4.5
(268)

Endpoint protection software with behavior-based analytics

learn more
FortiClient is an endpoint protection software that helps businesses identify malicious attacks across multiple vectors, including web, USB, and email. The software inventory management module allows managers to monitor all software installed on an endpoint and remove outdated applications.

Read more about FortiClient

Users also considered
Bitdefender GravityZone logo
4.6
(208)

Security & risk analytics platform with threat intelligence

learn more
Bitdefender GravityZone is a cloud-based security and risk analytics platform designed to help businesses of all sizes detect, respond to, and prevent cybersecurity threats. It offers over 30 security modules, which let users streamline endpoint detection and response and risk analytics.

Read more about Bitdefender GravityZone

Users also considered
Intercept X Endpoint logo
4.5
(214)

Endpoint protection software for security analysts

learn more
Intercept X Endpoint is an endpoint protection tool that helps IT administrators utilize detect and block malware attacks across networks. The software allows managers to identify and stop malicious encryption operations to protect the system against master boot record (MBR) ransomware.

Read more about Intercept X Endpoint

Users also considered
GoodAccess logo
4.9
(95)

Cloud VPN with identity-based access control in 10 minutes.

learn more
GoodAccess is a cloud VPN that helps remote teams to securely access business systems, cloud apps and other resources. In 10 minutes you create resilient private network with identity-based access control. No hardware, no maintenance fees. Just secure "anywhere, anytime" access for authorized users.

Read more about GoodAccess

Users also considered
DNSFilter logo
4.8
(83)

Cloud-based cybersecurity and network monitoring platform

learn more
DNSFilter is a cybersecurity management software that enables enterprises, K-12 schools, and universities to detect online security threats and malware using artificial intelligence (AI) technology, machine learning (ML) algorithms, and content filtering capabilities.

Read more about DNSFilter

Users also considered
Perimeter 81 logo
4.8
(69)

Radically simple cybersecurity.

learn more
Perimeter 81 is a leading Zero Trust Network Access platform, ensuring secure remote access from anywhere. Features such as Device Posture Check allow for endpoint protection, identity management, and advanced remote security.

Read more about Perimeter 81

Users also considered
OneLogin logo
4.6
(90)

Cloud-Based Identity Management & Single Sign-On System

learn more
OneLogin’s cloud based identity management platform provides secure single sign-on, multi-factor authentication and directory integration with AD, LDAP.

In addition to the above features, Gartner has recently named OneLogin a Leader in the 2020 Magic Quadrant for Access Management.

Read more about OneLogin

Users also considered
Teramind logo
4.6
(86)

Employee Monitoring, Insider Threat & Data Loss Prevention

learn more
Teramind is an employee monitoring, insider threats detection and data loss prevention solution. Track all activity and productivity of employees, privileged users, remote workers to prevent IP and data leaks.

Read more about Teramind

Users also considered
Lookout logo
4.7
(67)

Endpoint-to-cloud security for businesses with remote teams

learn more
Lookout is an integrated SASE solution that provides endpoint-to-cloud security, enabling remote teams to work from any location while protecting business data. It provides actionable insights that help businesses proactively identify potential threats such as ransomware, phishing attacks, and offensive web content. Lookout is designed to eliminate the need for standalone cybersecurity solutions.

Read more about Lookout

Users also considered
BlackBerry CylancePROTECT logo
4.6
(64)

Threat detection and endpoint protection platform

learn more
BlackBerry Protect is a cloud-based endpoint protection platform designed to help enterprises detect threats and protect devices from data breaches, grayware, and fileless malware attack. Features include role-based access control, real-time statistics, troubleshooting, and script whitelisting.

Read more about BlackBerry CylancePROTECT

Users also considered
Syxsense logo
4.6
(61)

Unified Security and Endpoint Management

learn more
Syxsense is a leading USEM solution designed to help SecOps departments, MSPs, and IT professionals in organizations with 100-100,000 endpoints manage and secure their environment.

Read more about Syxsense

Users also considered
PureVPN logo
4.3
(76)

Secured VPN service offering limitless, anonymous web access

learn more
Pure VPN, and PureVPN for Business, is a Virtual Private Network (VPN) for all platforms including Windows, Mac, Linux, iOS and Android that provides 256-bit secured, anonymous and P2P-enabled access to unrestricted internet browsing with features including IP address masking, split tunneling & more

Read more about PureVPN

Users also considered
Admin By Request logo
4.8
(37)

Local admin rights, managed.

learn more
Admin By Request is a security solution that enables organizations to monitor and control local admin rights across their endpoints. The tool offers Just-In-Time elevation, anti-malware file scanning, temporary local admin accounts, and a full inventory and Auditlog.

Read more about Admin By Request

Users also considered